The Ultimate Digital Signature

OOB Authorisation

What is Trusted Verify?

DIGITANIUM Trusted Verify provides a secure and dependable transaction authorization for seamless interactions in a trusted environment. Thanks to PKI- based digital signatures, the integrity and authenticity of all data and interactions are guaranteed and irrefutable.

DIGITANIUM Trusted Verify provides an end-to-end encrypted solution to authorize transactions using trusted digital identities and signatures. As a result, the authenticity of the details is secured in a binding a reliable way – “what you see is what you sign”.

What is Trusted Verify?

DIGITANIUM Trusted Verify provides a secure and dependable transaction authorization for seamless interactions in a trusted environment. Thanks to PKI- based digital signatures, the integrity and authenticity of all data and interactions are guaranteed and irrefutable.

DIGITANIUM Trusted Verify provides an end-to-end encrypted solution to authorize transactions using trusted digital identities and signatures. As a result, the authenticity of the details is secured in a binding a reliable way – “what you see is what you sign”.

Why KOBIL?

KOBIL Trusted Verify provides secure and dependable transaction authorization for seamless interactions in a trusted environment. Thanks to PKI-based digital signatures, the integrity and authenticity of all data and interactions is guaranteed and irrefutable. Thanks toTrusted Verify, outmoded methods such as SMS and OTP that cause media discontinuity can be easily eliminated. This way, you will not only strike a happy balance between cost and trust but also offer a unique customer experience at the same time.

KOBIL’s own “Dual-7-Layers-of-Security” approach is based on the KOBIL Smart Security Management Server (SSMS), its own Digitanium™ channel and the virtual smartcard which continuously protect the user, the app, the end devices and business processes. With this approach, organizations need only one app and one device to meet stringent requirements such as PSD2, DSGVO or eIDAS for transaction signatures.

By creating a secure and confidential environment, companies are able to expand their digital processes while improving the customer experience.

Scan and easily confirm your authorized transactions

QR Code Authorisation

What is Trusted Verify (QR-Based)?

We offer a unique authorization solution that allows our customers to confirm transactions even in offline mode. Here, it is important to note that transactions pending confirmation are included in the calculation of a security code. To this end, we employ our tried-and-tested KOBIL security technology, linking it to the purpose of authorizing secure transactions. Users only need to scan the transactions that are converted into a QR code with the mobile device. When the PIN for access to the app and the transaction data is entered, a unique security code will be generated. Users apply this code to authorize transactions they initiate. As always, the security code will be verified by the server.

What is Trusted Verify (QR-Based)?

We offer a unique authorization solution that allows our customers to confirm transactions even in offline mode. Here, it is important to note that transactions pending confirmation are included in the calculation of a security code. To this end, we employ our tried-and-tested KOBIL security technology, linking it to the purpose of authorizing secure transactions. Users only need to scan the transactions that are converted into a QR code with the mobile device. When the PIN for access to the app and the transaction data is entered, a unique security code will be generated. Users apply this code to authorize transactions they initiate. As always, the security code will be verified by the server.

Why QR Code Verification?

Another requirement is that offline signatures must be entered for transactions. Since KOBIL caters to both the online and offlnie world, its technologies are capable of meeting the challenge. Whether online or offline, transactions are easily verified with Trusted Verify. We meet the highest security standards and international requirements.

Confirm with certainty!

Strongest security, even without internet connection

Trusted Login (Offline)

What is offline authentication?

Trusted Login offers a secure version of robust authentication using its „offline mode” option. Your mobile device won‘t have to be connected to the internet. To generate a security code, KOBIL technology applies a proprietary process developed for this purpose.

In this process, the PIN becomes part of the security code. A code will always be generated regardless of whether the PIN is correct or not. But only a correct PIN will generate a correct code. While the security code is being verified, the PIN will also be verified by the server. Any user entering an incorrectly generated security code three times will be locked out by the server. This rules out any brute force attacks.

What is offline authentication?

Trusted Login offers a secure version of robust authentication using its „offline mode” option. Your mobile device won‘t have to be connected to the internet. To generate a security code, KOBIL technology applies a proprietary process developed for this purpose.

In this process, the PIN becomes part of the security code. A code will always be generated regardless of whether the PIN is correct or not. But only a correct PIN will generate a correct code. While the security code is being verified, the PIN will also be verified by the server. Any user entering an incorrectly generated security code three times will be locked out by the server. This rules out any brute force attacks.

Why Offline authentication?

Even today, there are areas without internet connection. To handle situations like this, KOBIL technology offers a highly secure version of offline authentication. This ensures a high level of security while taking user needs into account.

DUAL 7 Layers of Security

Server checks the client, the Client checks the server

Secure Device
  • Security Status of Device
  • Detect OS
  • Malware
  • Device Binding
  • Rooting & Jailbreaks
Secure App & Web
  • Detect Code Injection, Manipulation
  • App Integrity
  • Signature
  • Whitelisting
  • Certificate PIN
  • SSL Hooking
Digitanium Channel
  • Own SSL/TLS Implementation
  • Independent
  • Own trust store
Smart Security Management Server
  • App
  • Device
  • Identity
  • Certificates (TC)
  • Signature Verification
Virtual Smart Card
  • Independent Key Stores
  • Unlocking Only By Security Server
  • Encapsulated Private Key
Trusted Identity
  • A focus on identity is an integral part of the process.
Digital Signature
  • Private/Public Key Principle
  • Signature-based Interaction
One Technology for all platforms:
Comply with the regulatory:
  • eIDAS
  • GDPR
  • PSD2

Technology

Get in Touch